Abstract—As users become increasingly aware of the need to adopt strong password, it also brings challenges to digital forensics investigators due to the password protection of potential evidence data. In this paper, we discuss existing password recovery methods and present a design of a time-memory trade-off pre-computed table coupled with a new sorting algorithm. We also propose 2 new storage methods and evaluated their performance based on storage conservation and success rate improvement. Considering both alpha-numeric passwords and passwords consisting of any printable ASCII character, we show that we are able to optimize the rainbow table performance through an improvement of up to 26.13 % in terms of password recovery success rate, a...
Human memory is not perfect – people constantly memorize new facts and forget old ones. One example ...
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of password...
Graphical passwords are an alternative form of authentication that use images for login, and leverag...
Part 12: Authentication and DelegationInternational audienceAs users become increasingly aware of th...
International audienceCryptanalytic time-memory trade-offs are techniques introduced by Hellman in 1...
Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they ar...
Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large p...
International audienceA cryptanalytic time-memory trade-off is a technique that aims to reduce the t...
Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several ...
International audienceCryptanalytic time-memory trade-offs (TMTOs) are techniques commonly used in c...
A cryptanalytic time-memory tradeoff (TMTO) is a technique that aims to reduce the time needed to pe...
This paper presents a hardware architecture for UNIX password cracking using Hellman's time-memory t...
A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digita...
The inverse relation between memorability of a password and the strength of a password presents a un...
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example ...
Human memory is not perfect – people constantly memorize new facts and forget old ones. One example ...
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of password...
Graphical passwords are an alternative form of authentication that use images for login, and leverag...
Part 12: Authentication and DelegationInternational audienceAs users become increasingly aware of th...
International audienceCryptanalytic time-memory trade-offs are techniques introduced by Hellman in 1...
Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they ar...
Rainbow tables reduce the difficulty in brute force cracking a single password by creating a large p...
International audienceA cryptanalytic time-memory trade-off is a technique that aims to reduce the t...
Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several ...
International audienceCryptanalytic time-memory trade-offs (TMTOs) are techniques commonly used in c...
A cryptanalytic time-memory tradeoff (TMTO) is a technique that aims to reduce the time needed to pe...
This paper presents a hardware architecture for UNIX password cracking using Hellman's time-memory t...
A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digita...
The inverse relation between memorability of a password and the strength of a password presents a un...
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example ...
Human memory is not perfect – people constantly memorize new facts and forget old ones. One example ...
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of password...
Graphical passwords are an alternative form of authentication that use images for login, and leverag...